www.imaf.lk
Open in
urlscan Pro
144.91.86.39
Malicious Activity!
Public Scan
Effective URL: https://www.imaf.lk/cmtb/dmer.html
Submission: On June 01 via manual from ZA
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 30th 2020. Valid for: 3 months.
This is the only time www.imaf.lk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Capitec Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 31.31.198.110 31.31.198.110 | 197695 (AS-REG) (AS-REG) | |
10 | 144.91.86.39 144.91.86.39 | 51167 (CONTABO) (CONTABO) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
imaf.lk
www.imaf.lk |
55 KB |
1 |
gstatic.com
fonts.gstatic.com |
11 KB |
1 |
googleapis.com
fonts.googleapis.com |
503 B |
1 |
vetmir58.ru
vetmir58.ru |
272 B |
13 | 4 |
Domain | Requested by | |
---|---|---|
10 | www.imaf.lk |
www.imaf.lk
|
1 | fonts.gstatic.com |
www.imaf.lk
|
1 | fonts.googleapis.com |
www.imaf.lk
|
1 | vetmir58.ru | |
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vetmir58.ru Let's Encrypt Authority X3 |
2020-04-20 - 2020-07-19 |
3 months | crt.sh |
mail.imaf.lk Let's Encrypt Authority X3 |
2020-05-30 - 2020-08-28 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.imaf.lk/cmtb/dmer.html
Frame ID: 1D0DD19E60981BA073CF5664FC2126C2
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://vetmir58.ru/nerc.php Page URL
- https://www.imaf.lk/cmtb/dmer.html Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://vetmir58.ru/nerc.php Page URL
- https://www.imaf.lk/cmtb/dmer.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
nerc.php
vetmir58.ru/ |
109 B 272 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
dmer.html
www.imaf.lk/cmtb/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default-3.0.0.css
www.imaf.lk/cmtb/ |
55 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-1.8.10.custom.min.css
www.imaf.lk/cmtb/ |
20 KB 6 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.custom.min-1.1.0.css
www.imaf.lk/cmtb/ |
20 KB 6 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
858 B 503 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_main.png
www.imaf.lk/cmtb/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginSubmitForm-1.0.0.js.download
www.imaf.lk/cmtb/ |
20 KB 6 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
proceed.gif
www.imaf.lk/cmtb/ |
259 B 319 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SSL-certificate-seal-ssl-animated.gif
www.imaf.lk/cmtb/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.woff
www.imaf.lk/fonts/ |
20 KB 6 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EYqxmaNOzLlWtsZSScy6XTNpcZGf2w.woff2
fonts.gstatic.com/s/ropasans/v9/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.ttf
www.imaf.lk/fonts/ |
20 KB 6 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Capitec Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
vetmir58.ru
www.imaf.lk
144.91.86.39
2a00:1450:4001:815::200a
2a00:1450:4001:820::2003
31.31.198.110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